Recent from talks
Nothing was collected or created yet.
Spyware
View on Wikipedia
| Part of a series on |
| Computer hacking |
|---|
Spyware (a portmanteau for spying software) is any malware that aims to gather information about a person or organization and send it to another entity in a way that harms the user by violating their privacy, endangering their device's security, or other means. This behavior may be present in other malware and in legitimate software. Websites may engage in spyware behaviors like web tracking. Hardware devices may also be affected.[1]
Spyware is frequently associated with advertising and involves many of the same issues. Because these behaviors are so common, and can have non-harmful uses, providing a precise definition of spyware is a difficult task.[2]
History
[edit]
As personal computers and broadband connections became more common, the use of the internet for e-commerce transactions rose.[4] Early retailers included book dealer Amazon.com and CD retailer CDNOW.com, which both were founded in 1994.[5] As competition over customers intensified, some e-commerce companies turned to questionable methods to entice customers into completing transactions with them.[6]
The first recorded use of the term spyware occurred on October 16, 1995, in a Usenet post that poked fun at Microsoft's business model.[7] Spyware at first denoted software meant for espionage purposes. However, in early 2000 the founder of Zone Labs, Gregor Freund, used the term in a press release for the ZoneAlarm Personal Firewall.[8]
In early 2000, Steve Gibson formulated the first description of spyware after realizing software that stole his personal information had been installed on his computer.[9]
Spyware is any software that employs a user's internet connection in the background or "backchannel" without their knowledge or consent.[citation needed]
Later in 2000, a parent using ZoneAlarm was alerted to the fact that Reader Rabbit, educational software marketed to children by the Mattel toy company, was surreptitiously sending data back to Mattel.[10] Since then, "spyware" has taken on its present sense.
According to a 2005 study by AOL and the National Cyber-Security Alliance, 61 percent of surveyed users' computers were infected with some form of spyware. 92 percent of surveyed users with spyware reported that they did not know of its presence, and 91 percent reported that they had not given permission for the installation of the spyware.[11] As of 2006[update], spyware has become one of the preeminent security threats to computer systems running Microsoft Windows operating systems. Computers on which Internet Explorer (IE) was the primary browser are particularly vulnerable to such attacks, not only because IE was the most widely used,[12] but also because its tight integration with Windows allows spyware access to crucial parts of the operating system.[12][13]
Before Internet Explorer 6 SP2 was released as part of Windows XP Service Pack 2, the browser would automatically display an installation window for any ActiveX component that a website wanted to install. The combination of user ignorance about these changes, and the assumption by Internet Explorer that all ActiveX components are benign, helped to spread spyware significantly. Many spyware components would also make use of exploits in JavaScript, Internet Explorer and Windows to install without user knowledge or permission.
The Windows Registry contains multiple sections where modification of key values allows software to be executed automatically when the operating system boots. Spyware can exploit this design to circumvent attempts at removal. The spyware typically links itself to each location in the registry that allows execution. Once running, the spyware will periodically check if any of these links are removed. If so, they will be automatically restored. This ensures that the spyware will execute when the operating system is booted, even if some (or most) of the registry links are removed.
Targeted advertisement
[edit]In the search for more effective advertising strategies, companies soon discovered the potential in ads that were targeted towards user interests. Once targeted advertising began to appear online, advertisers began to develop software that became known as spyware that collected users' personal interests through their browsing habits. Spyware brought along reduced system performance and security. The information gathered by spyware was used for constructing user profiles detailing what users could be persuaded to buy. The introduction of online advertisements opened up a new way of funding software development by having the software display advertisements to its users; software developers could offer their software "free of charge", since they were paid by the advertising agency. However, there is a distinction between "free of charge" and a "free gift", differences arising in the fact that a free gift is given without any expectations of future compensation, while something provided free of charge expects something in return. When downloading software described as "free of charge", users had no reason to suspect that it would report their Internet usage so that presented advertisements could be targeted towards their interests.
Problems arose due to users not being informed about neither the occurrence nor the extent of such monitoring, and were not given a chance to decide on whether to participate or not. As advertisements became targeted, the borders between adware and spyware started to dissolve, it started to both monitor users and deliver targeted ads.
The arms-race between spyware vendors
[edit]As the chase for faster financial gains intensified, several competing advertisers turned to more nefarious methods in an attempt to stay ahead of their competitors. As a result, this created a gray area between conventional ads that people chose to see, such as ads from subscription services, ads pushed on users through "pop-ups" and downloaded ads displayed in a program itself.[14] This practice pushed online advertising closer to the dark side of spam and other types of invasive, privacy compromising advertising.[15] During this development, users experienced infections from unsolicited software that crashed their computers by accident, changed application settings, harvested personal information, and deteriorated their computer experience.[16] Over time, these problems led to the introduction of countermeasures in the form of anti-spyware tools.
Anti-spyware has become a new area of online vending with fierce competition. These tools purported to clean computers from spyware, adware, and any other type of shady software located in that same gray area. This type of software can lead to false positives as some types of legitimate software came to be branded by some users as "Spyware" (i.e. Spybot: Search & Destroy identifies the Scan Spyware program as a Spybot.) These tools were designed similarly to anti-malware tools, such as antivirus software. Anti-spyware tools identify programs using signatures (semantics, program code, or other identifying attributes). The process only works on known programs, which can lead to the false positives mentioned earlier and leave previously unknown spyware undetected. To further aggravate the situation, some shady companies distributed fake anti-spyware tools in their search for a larger piece of the online advertising market. These fake tools claimed to remove spyware, but instead installed their own share of adware and spyware on unsuspecting users' computers. Sometimes, this software would also remove adware and spyware from competing vendors.
New spyware programs are constantly being released in what seems to be a never-ending stream, although the increase has leveled out somewhat over the last few years. According to developers of anti-spyware programs, the fight against spyware is more complicated than the fight against viruses, trojan horses, and worms.[17] There is still no consensus on a definition or classification system of spyware, which negatively affects the accuracy of anti-spyware tools resulting in some spyware programs being able to remain undetected on users' computers.[18][19]
Overview
[edit]Spyware is mostly classified into four types: adware, system monitors, tracking including web tracking, and trojans;[20] examples of other notorious types include digital rights management capabilities that "phone home", keyloggers, rootkits, and web beacons. These four categories are not mutually exclusive and they have similar tactics in attacking networks and devices.[21] The main goal is to install, hack into the network, avoid being detected, and safely remove themselves from the network.[21]
Spyware is mostly used for the stealing information and storing Internet users' movements on the Web and serving up pop-up ads to Internet users.[22] Whenever spyware is used for malicious purposes, its presence is typically hidden from the user and can be difficult to detect. Some spyware, such as keyloggers, may be installed by the owner of a shared, corporate, or public computer intentionally in order to monitor users.
While the term spyware suggests software that monitors a user's computer, the functions of spyware can extend beyond simple monitoring. Spyware can collect almost any type of data, including personal information like internet surfing habits, user logins, and bank or credit account information. Spyware can also interfere with a user's control of a computer by installing additional software or redirecting web browsers.[23] Some spyware can change computer settings, which can result in slow Internet connection speeds, un-authorized changes in browser settings, or changes to software settings.
Sometimes, spyware is included along with genuine software, and may come from a malicious website or may have been added to the intentional functionality of genuine software (see the paragraph about Facebook, below). In response to the emergence of spyware, a small industry has sprung up dealing in anti-spyware software. Running anti-spyware software has become a widely recognized element of computer security practices, especially for computers running Microsoft Windows. A number of jurisdictions have passed anti-spyware laws, which usually target any software that is surreptitiously installed to control a user's computer.
In German-speaking countries, spyware used or made by the government is called govware by computer experts (in common parlance: Regierungstrojaner, literally "Government Trojan"). Govware is typically a trojan horse software used to intercept communications from the target computer. Some countries, like Switzerland and Germany, have a legal framework governing the use of such software.[24][25] In the US, the term "policeware" has been used for similar purposes.[26]
Use of the term "spyware" has eventually declined as the practice of tracking users has been pushed ever further into the mainstream by major websites and data mining companies; these generally break no known laws and compel users to be tracked, not by fraudulent practices per se, but by the default settings created for users and the language of terms-of-service agreements.
In one documented example, on CBS/CNet News reported, on March 7, 2011, an analysis in The Wall Street Journal revealed the practice of Facebook and other websites of tracking users' browsing activity, which is linked to their identity, far beyond users' visits and activity on the Facebook site itself. The report stated: "Here's how it works. You go to Facebook, you log in, you spend some time there, and then ... you move on without logging out. Let's say the next site you go to is The New York Times. Those buttons, without you clicking on them, have just reported back to Facebook and Twitter that you went there and also your identity within those accounts. Let's say you moved on to something like a site about depression. This one also has a tweet button, a Google widget, and those, too, can report back who you are and that you went there." The Wall Street Journal analysis was researched by Brian Kennish, founder of Disconnect, Inc.[27]
Privacy-invasive software
[edit]Privacy-invasive software is a category of software that invades a user's privacy to gather information about the user and their device without prior knowledge or consent. Such software is sometimes loosely referred to as "spyware" but the information gathering can be malicious or non-malicious.[28] The collected data is often used commercially such as being sold to advertisers or other third parties.[29].
Definitions
[edit]Despite different interpretations of the definition of spyware; all descriptions include two central aspects, a degree of associated user consent, and the level of negative impact they impart on the user and their computer system (further discussed in Section 2.3 and Section 2.5 in (Boldt 2007a)). Because of the diffuse understanding in the spyware concept, the Anti-Spyware Coalition (ASC), constituted by public interest groups, trade associations, and anti-spyware companies, has come to the conclusion that the term spyware should be used at two different abstraction levels.[30] At the low level, they use the following definition, which is similar to Steve Gibson's original one:
In its narrow sense, Spyware is a term for tracking software deployed without adequate notice, consent, or control for the user.
However, since this definition does not encompass all of the different types of spyware available, they also provide a wider definition, which is more abstract in its appearance:
In its broader sense, spyware is used as a synonym for what the ASC calls "Spyware (and Other Potentially Unwanted Technologies)". Technologies deployed without appropriate user consent and/or implemented in ways that impair user control over:
1) Material changes that affect their user experience, privacy, or system security;
2) Use of their system resources, including what programs are installed on their computers; and/or
3) Collection, use, and distribution of their personal or other sensitive information.
Difficulties in defining spyware forced the ASC to define what they call Spyware (and Other Potentially Unwanted Technologies) instead. This includes any software that does not have the users' explicit consent for running on their computers. Another group that has tried to define spyware is StopBadware, which consists of actors such as Harvard Law School, Oxford University, Google, Lenovo, and Sun Microsystems.[31] StopBadware does not use the term spyware at all, but instead introduced the term badware. Their definition is as follows:[32]
An application is badware in one of two cases:
1. If the application acts deceptively or irreversibly.
2. If the application engages in potentially objectionable behavior without:
- First, prominently disclosing to the user that it will engage in such behavior, in clear and non-technical language, and
- Then, obtaining the user's affirmative consent to that aspect of the application.
— "Stop Badware Software Guidelines". April 7, 2006. Archived from the original on April 7, 2006.
Distinction
[edit]Disagreement among users and organizations on the definition of the term "spyware" has resulted from the subjectivity of the term. What some users regard as legitimate software could be regarded as a spyware by others. As the term "spyware" has gained traction; close synonyms such as trackware, evilware and badware have been created to distinguish the subject from the term spyware. As a result, the term privacy-invasive software was introduced to encapsulate all such software.

The work by Warkentiens et al. (described in Section 7.3.1 in (Boldt 2007a)) can be used as a starting point when developing a classification of privacy-invasive software, where privacy-invasive software is classified as a combination between user consent and direct negative consequences. User consent is specified as either low, medium or high, while the degree of direct negative consequences span between tolerable, moderate, and severe. This classification allows developers and users to first make a distinction between legitimate software and spyware, and secondly between spyware and malicious software. All software that has a low user consent, or which impairs severe direct negative consequences should be regarded as malware. While, on the other hand, any software that has high user consent, and which results in tolerable direct negative consequences should be regarded as legitimate software. Under this classification system, spyware constitutes the remaining group of software, i.e. those that have medium user consent, or which impair moderate direct negative consequences. This classification is described in further detail in Chapter 7 in (Boldt 2007a).
This classification system is broken down further with the distinction of direct negative consequences and indirect negative consequences. This distinguishes between any negative behavior a program has been designed to carry out (direct negative consequences) and security threats introduced by just having that software executing on the system (indirect negative consequences). One example of an indirect negative consequence is the exploitation risk of software vulnerabilities in programs that execute on users' systems without their knowledge.[33]
Routes of infection
[edit]Spyware does not necessarily spread in the same way as a virus or worm because infected systems generally do not attempt to transmit or copy the software to other computers. Instead, spyware installs itself on a system by deceiving the user or by exploiting software vulnerabilities.
Most spyware is installed without knowledge, or by using deceptive tactics. Spyware may try to deceive users by bundling itself with desirable software. Other common tactics are using a Trojan horse, spy gadgets that look like normal devices but turn out to be something else, such as a USB Keylogger. These devices actually are connected to the device as memory units but are capable of recording each stroke made on the keyboard. Some spyware authors infect a system through security holes in the Web browser or in other software. When the user navigates to a Web page controlled by the spyware author, the page contains code which attacks the browser and forces the download and installation of spyware.
The installation of spyware frequently involves Internet Explorer. Its popularity and history of security issues have made it a frequent target. Its deep integration with the Windows environment make it susceptible to attack into the Windows operating system. Internet Explorer also serves as a point of attachment for spyware in the form of Browser Helper Objects, which modify the browser's behaviour.
Effects and behaviors
[edit]This section relies largely or entirely upon a single source. (December 2018) |
A spyware program rarely operates alone on a computer; an affected machine usually has multiple infections. Users frequently notice unwanted behavior and degradation of system performance. A spyware infestation can create significant unwanted CPU activity, disk usage, and network traffic. Stability issues, such as applications freezing, failure to boot, and system-wide crashes are also common. Usually, this effect is intentional, but may be caused from the malware simply requiring large amounts of computing power, disk space, or network usage. Spyware, which interferes with networking software commonly causes difficulty connecting to the Internet.
In some infections, the spyware is not even evident. Users assume in those situations that the performance issues relate to faulty hardware, Windows installation problems, or another malware infection. Some owners of badly infected systems resort to contacting technical support experts, or even buying a new computer because the existing system "has become too slow". Badly infected systems may require a clean reinstallation of all their software in order to return to full functionality.
Moreover, some types of spyware disable software firewalls and antivirus software, and/or reduce browser security settings, which opens the system to further opportunistic infections. Some spyware disables or even removes competing spyware programs, on the grounds that more spyware-related annoyances increase the likelihood that users will take action to remove the programs.[34]
Keyloggers are sometimes part of malware packages downloaded onto computers without the owners' knowledge. Some keylogger software is freely available on the internet, while others are commercial or private applications. Most keyloggers allow not only keyboard keystrokes to be captured, they also are often capable of collecting screen captures from the computer.
A typical Windows user has administrative privileges, mostly for convenience. Because of this, any program the user runs has unrestricted access to the system. As with other operating systems, Windows users are able to follow the principle of least privilege and use non-administrator accounts. Alternatively, they can reduce the privileges of specific vulnerable Internet-facing processes, such as Internet Explorer.
Since Windows Vista is, by default, a computer administrator that runs everything under limited user privileges, when a program requires administrative privileges, a User Account Control pop-up will prompt the user to allow or deny the action. This improves on the design used by previous versions of Windows. Spyware is also known as tracking software.
Remedies and prevention
[edit]As the spyware threat has evolved, a number of techniques have emerged to counteract it. These include programs designed to remove or block spyware, as well as various user practices which reduce the chance of getting spyware on a system.
Nonetheless, spyware remains a costly problem. When a large number of pieces of spyware have infected a Windows computer, the only remedy may involve backing up user data, and fully reinstalling the operating system. For instance, some spyware cannot be completely removed with tools from Symantec, Microsoft, PC Tools (company).
Anti-spyware programs
[edit]Many programmers and some commercial firms have released products designed to remove or block spyware. Programs such as PC Tools' Spyware Doctor, Lavasoft's Ad-Aware SE and Patrick Kolla's Spybot - Search & Destroy rapidly gained popularity as tools to remove, and in some cases intercept, spyware programs. In December 2004, Microsoft acquired the GIANT AntiSpyware software,[35] re‑branding it as Microsoft AntiSpyware (Beta 1) and releasing it as a free download for Genuine Windows XP and Windows 2003 users. In November, 2005, it was renamed Windows Defender.[36][37]
Major anti-virus firms such as Symantec, PC Tools, McAfee and Sophos have also added anti-spyware features to their existing anti-virus products. Early on, anti-virus firms expressed reluctance to add anti-spyware functions, citing lawsuits brought by spyware authors against the authors of web sites and programs which described their products as "spyware". However, recent versions of these major firms home and business anti-virus products do include anti-spyware functions, albeit treated differently from viruses. Symantec Anti-Virus, for instance, categorizes spyware programs as "extended threats" and now offers real-time protection against these threats.
Other Anti-spyware tools include FlexiSPY, Mobilespy, mSPY, TheWiSPY, and UMobix.[38]
How anti-spyware software works
[edit]Anti-spyware programs can combat spyware in two ways:
- They can provide real-time protection in a manner similar to that of anti-virus protection: all incoming network data is scanned for spyware, and any detected threats are blocked.
- Anti-spyware software programs can be used solely for detection and removal of spyware software that has already been installed into the computer. This kind of anti-spyware can often be set to scan on a regular schedule.
Such programs inspect the contents of the Windows registry, operating system files, and installed programs, and remove files and entries which match a list of known spyware. Real-time protection from spyware works identically to real-time anti-virus protection: the software scans disk files at download time, and blocks the activity of components known to represent spyware. In some cases, it may also intercept attempts to install start-up items or to modify browser settings. Earlier versions of anti-spyware programs focused chiefly on detection and removal. Javacool Software's SpywareBlaster, one of the first to offer real-time protection, blocked the installation of ActiveX-based spyware.
Like most anti-virus software, many anti-spyware/adware tools require a frequently updated database of threats. As new spyware programs are released, anti-spyware developers discover and evaluate them, adding to the list of known spyware, which allows the software to detect and remove new spyware. As a result, anti-spyware software is of limited usefulness without regular updates. Updates may be installed automatically or manually.
A popular generic spyware removal tool used by those that requires a certain degree of expertise is HijackThis, which scans certain areas of the Windows OS where spyware often resides and presents a list with items to delete manually. As most of the items are legitimate windows files/registry entries it is advised for those who are less knowledgeable on this subject to post a HijackThis log on the numerous antispyware sites and let the experts decide what to delete.
If a spyware program is not blocked and manages to get itself installed, it may resist attempts to terminate or uninstall it. Some programs work in pairs: when an anti-spyware scanner (or the user) terminates one running process, the other one respawns the killed program. Likewise, some spyware will detect attempts to remove registry keys and immediately add them again. Usually, booting the infected computer in safe mode allows an anti-spyware program a better chance of removing persistent spyware. Killing the process tree may also work.
Security practices
[edit]To detect spyware, computer users have found several practices useful in addition to installing anti-spyware programs. Many users have installed a web browser other than Internet Explorer, such as Mozilla Firefox or Google Chrome. Though no browser is completely safe, Internet Explorer was once at a greater risk for spyware infection due to its large user base as well as vulnerabilities such as ActiveX but these three major browsers are now close to equivalent when it comes to security.[39][40]
Some ISPs—particularly colleges and universities—have taken a different approach to blocking spyware: they use their network firewalls and web proxies to block access to Web sites known to install spyware. On March 31, 2005, Cornell University's Information Technology department released a report detailing the behavior of one particular piece of proxy-based spyware, Marketscore, and the steps the university took to intercept it.[41] Many other educational institutions have taken similar steps.
Individual users can also install firewalls from a variety of companies. These monitor the flow of information going to and from a networked computer and provide protection against spyware and malware. Some users install a large hosts file which prevents the user's computer from connecting to known spyware-related web addresses. Spyware may get installed via certain shareware programs offered for download. Downloading programs only from reputable sources can provide some protection from this source of attack.[14]
Individual users can use cellphone / computer with physical (electric) switch, or isolated electronic switch that disconnects microphone, camera without bypass and keep it in disconnected position where not in use, that limits information that spyware can collect. (Policy recommended by NIST Guidelines for Managing the Security of Mobile Devices, 2013).
Applications
[edit]"Stealware" and affiliate fraud
[edit]A few spyware vendors, notably 180 Solutions, have written what the New York Times has dubbed "stealware", and what spyware researcher Ben Edelman terms affiliate fraud, a form of click fraud. Stealware diverts the payment of affiliate marketing revenues from the legitimate affiliate to the spyware vendor.
Spyware which attacks affiliate networks places the spyware operator's affiliate tag on the user's activity – replacing any other tag, if there is one. The spyware operator is the only party that gains from this. The user has their choices thwarted, a legitimate affiliate loses revenue, networks' reputations are injured, and vendors are harmed by having to pay out affiliate revenues to an "affiliate" who is not party to a contract.[42] Affiliate fraud is a violation of the terms of service of most affiliate marketing networks. Mobile devices can also be vulnerable to chargeware, which manipulates users into illegitimate mobile charges.
Identity theft and fraud
[edit]In one case, spyware has been closely associated with identity theft.[43] In August 2005, researchers from security software firm Sunbelt Software suspected the creators of the common CoolWebSearch spyware had used it to transmit "chat sessions, user names, passwords, bank information, etc.";[44] however it turned out that "it actually (was) its own sophisticated criminal little trojan that's independent of CWS."[45] This case was investigated by the FBI.
The Federal Trade Commission estimates that 27.3 million Americans have been victims of identity theft, and that financial losses from identity theft totaled nearly $48 billion for businesses and financial institutions and at least $5 billion in out-of-pocket expenses for individuals.[46]
Digital rights management
[edit]Some copy-protection technologies have borrowed from spyware. In 2005, Sony BMG Music Entertainment was found to be using rootkits in its XCP digital rights management technology[47] Like spyware, not only was it difficult to detect and uninstall, it was so poorly written that most efforts to remove it could have rendered computers unable to function. Texas Attorney General Greg Abbott filed suit,[48] and three separate class-action suits were filed.[49] Sony BMG later provided a workaround on its website to help users remove it.[50]
Beginning on April 25, 2006, Microsoft's Windows Genuine Advantage Notifications application[51] was installed on most Windows PCs as a "critical security update". While the main purpose of this deliberately uninstallable application is to ensure the copy of Windows on the machine was lawfully purchased and installed, it also installs software that has been accused of "phoning home" on a daily basis, like spyware.[52][53] It can be removed with the RemoveWGA tool.
Personal relationships
[edit]Stalkerware is spyware that has been used to monitor electronic activities of partners in intimate relationships. At least one software package, Loverspy, was specifically marketed for this purpose. Depending on local laws regarding communal/marital property, observing a partner's online activity without their consent may be illegal; the author of Loverspy and several users of the product were indicted in California in 2005 on charges of wiretapping and various computer crimes.[54]
Browser cookies
[edit]Anti-spyware programs often report Web advertisers' HTTP cookies, the small text files that track browsing activity, as spyware. While they are not always inherently malicious, many users object to third parties using space on their personal computers for their business purposes, and many anti-spyware programs offer to remove them.[55]
Shameware
[edit]Shameware or "accountability software" is a type of spyware that is not hidden from the user, but operates with their knowledge, if not necessarily their consent. Parents, religious leaders or other authority figures may require their children or congregation members to install such software, which is intended to detect the viewing of pornography or other content deemed inappropriate, and to report it to the authority figure, who may then confront the user about it.[56]
Spyware programs
[edit]These common spyware programs illustrate the diversity of behaviors found in these attacks. Note that as with computer viruses, researchers give names to spyware programs which may not be used by their creators. Programs may be grouped into "families" based not on shared program code, but on common behaviors, or by "following the money" of apparent financial or business connections. For instance, a number of the spyware programs distributed by Claria are collectively known as "Gator". Likewise, programs that are frequently installed together may be described as parts of the same spyware package, even if they function separately.
Spyware vendors
[edit]Spyware vendors include NSO Group, which in the 2010s sold spyware to governments for spying on human rights activists and journalists.[57][58][59] NSO Group was investigated by Citizen Lab.[57][59]
Rogue anti-spyware programs
[edit]Malicious programmers have released a large number of rogue (fake) anti-spyware programs, and widely distributed Web banner ads can warn users that their computers have been infected with spyware, directing them to purchase programs which do not actually remove spyware—or else, may add more spyware of their own.[60][61]
The recent[update] proliferation of fake or spoofed antivirus products that bill themselves as antispyware can be troublesome. Users may receive popups prompting them to install them to protect their computer, when it will in fact add spyware. It is recommended that users do not install any freeware claiming to be anti-spyware unless it is verified to be legitimate. Some known offenders include:
Fake antivirus products constitute 15 percent of all malware.[63]
On January 26, 2006, Microsoft and the Washington state attorney general filed suit against Secure Computer for its Spyware Cleaner product.[64]
Legal issues
[edit]Criminal law
[edit]Unauthorized access to a computer is illegal under computer crime laws, such as the U.S. Computer Fraud and Abuse Act, the U.K.'s Computer Misuse Act, and similar laws in other countries. Since owners of computers infected with spyware generally claim that they never authorized the installation, a prima facie reading would suggest that the promulgation of spyware would count as a criminal act. Law enforcement has often pursued the authors of other malware, particularly viruses. However, few spyware developers have been prosecuted, and many operate openly as strictly legitimate businesses, though some have faced lawsuits.[65][66]
Spyware producers argue that, contrary to the users' claims, users do in fact give consent to installations. Spyware that comes bundled with shareware applications may be described in the legalese text of an end-user license agreement (EULA). Many users habitually ignore these purported contracts, but spyware companies such as Claria say these demonstrate that users have consented.
Despite the ubiquity of EULAs agreements, under which a single click can be taken as consent to the entire text, relatively little caselaw has resulted from their use. It has been established in most common law jurisdictions that this type of agreement can be a binding contract in certain circumstances.[67] This does not, however, mean that every such agreement is a contract, or that every term in one is enforceable.
Some jurisdictions, including the U.S. states of Iowa[68] and Washington,[69] have passed laws criminalizing some forms of spyware. Such laws make it illegal for anyone other than the owner or operator of a computer to install software that alters Web-browser settings, monitors keystrokes, or disables computer-security software.
In the United States, lawmakers introduced a bill in 2005 entitled the Internet Spyware Prevention Act, which would imprison creators of spyware.[70]
Additionally, several diplomatic efforts have been made to curb the growing usage of Spywares. Launched by France and the UK in early 2024, the Pall Mall Process[71] aims to address the proliferation and irresponsible use of commercial cyber intrusion capabilities.
Administrative sanctions
[edit]US FTC actions
[edit]The US Federal Trade Commission has sued Internet marketing organizations under the "unfairness doctrine"[72] to make them stop infecting consumers' PCs with spyware. In one case, that against Seismic Entertainment Productions, the FTC accused the defendants of developing a program that seized control of PCs nationwide, infected them with spyware and other malicious software, bombarded them with a barrage of pop-up advertising for Seismic's clients, exposed the PCs to security risks, and caused them to malfunction. Seismic then offered to sell the victims an "antispyware" program to fix the computers, and stop the popups and other problems that Seismic had caused. On November 21, 2006, a settlement was entered in federal court under which a $1.75 million judgment was imposed in one case and $1.86 million in another, but the defendants were insolvent[73]
In a second case, brought against CyberSpy Software LLC, the FTC charged that CyberSpy marketed and sold "RemoteSpy" keylogger spyware to clients who would then secretly monitor unsuspecting consumers' computers. According to the FTC, Cyberspy touted RemoteSpy as a "100% undetectable" way to "Spy on Anyone. From Anywhere." The FTC has obtained a temporary order prohibiting the defendants from selling the software and disconnecting from the Internet any of their servers that collect, store, or provide access to information that this software has gathered. The case is still in its preliminary stages. A complaint filed by the Electronic Privacy Information Center (EPIC) brought the RemoteSpy software to the FTC's attention.[74]
Netherlands OPTA
[edit]An administrative fine, the first of its kind in Europe, has been issued by the Independent Authority of Posts and Telecommunications (OPTA) from the Netherlands. It applied fines in total value of Euro 1,000,000 for infecting 22 million computers. The spyware concerned is called DollarRevenue. The law articles that have been violated are art. 4.1 of the Decision on universal service providers and on the interests of end users; the fines have been issued based on art. 15.4 taken together with art. 15.10 of the Dutch telecommunications law.[75]
Civil law
[edit]Former New York State Attorney General and former Governor of New York Eliot Spitzer has pursued spyware companies for fraudulent installation of software.[76] In a suit brought in 2005 by Spitzer, the California firm Intermix Media, Inc. ended up settling, by agreeing to pay US$7.5 million and to stop distributing spyware.[77]
The hijacking of Web advertisements has also led to litigation. In June 2002, a number of large Web publishers sued Claria for replacing advertisements, but settled out of court.
Courts have not yet had to decide whether advertisers can be held liable for spyware that displays their ads. In many cases, the companies whose advertisements appear in spyware pop-ups do not directly do business with the spyware firm. Rather, they have contracted with an advertising agency, which in turn contracts with an online subcontractor who gets paid by the number of "impressions" or appearances of the advertisement. Some major firms such as Dell Computer and Mercedes-Benz have sacked advertising agencies that have run their ads in spyware.[78]
Libel suits by spyware developers
[edit]Litigation has gone both ways. Since "spyware" has become a common pejorative, some makers have filed libel and defamation actions when their products have been so described. In 2003, Gator (now known as Claria) filed suit against the website PC Pitstop for describing its program as "spyware".[79] PC Pitstop settled, agreeing not to use the word "spyware", but continues to describe harm caused by the Gator/Claria software.[80] As a result, other anti-spyware and anti-virus companies have also used other terms such as "potentially unwanted programs" or greyware to denote these products.
WebcamGate
[edit]In the 2010 WebcamGate case, plaintiffs charged two suburban Philadelphia high schools secretly spied on students by surreptitiously and remotely activating webcams embedded in school-issued laptops the students were using at home, and therefore infringed on their privacy rights. The school loaded each student's computer with LANrev's remote activation tracking software. This included the now-discontinued "TheftTrack". While TheftTrack was not enabled by default on the software, the program allowed the school district to elect to activate it, and to choose which of the TheftTrack surveillance options the school wanted to enable.[81]
TheftTrack allowed school district employees to secretly remotely activate the webcam embedded in the student's laptop, above the laptop's screen. That allowed school officials to secretly take photos through the webcam, of whatever was in front of it and in its line of sight, and send the photos to the school's server. The LANrev software disabled the webcams for all other uses (e.g., students were unable to use Photo Booth or video chat), so most students mistakenly believed their webcams did not work at all. On top of the webcam surveillance, TheftTrack allowed school officials to take screenshots and send them to the school's server. School officials were also granted the ability to take snapshots of instant messages, web browsing, music playlists, and written compositions. The schools admitted to secretly snapping over 66,000 webshots and screenshots, including webcam shots of students in their bedrooms.[81][82][83]
See also
[edit]References
[edit]- ^ "Amazon Workers Are Listening to What You Tell Alexa". Bloomberg.com. April 10, 2019. Archived from the original on August 29, 2020. Retrieved August 25, 2020.
- ^ Monitoring Software on Your PC: Spyware, Adware, and Other Software (PDF) (Report). March 2005. Archived from the original (PDF) on December 26, 2010.
- ^ "Pegasus: Spyware sold to governments 'targets activists'". BBC. July 18, 2021. Retrieved April 6, 2025.
- ^ Abhijit, C.; Kuilboer, J.P. (2002), E-Business & E-Commerce Infrastructure: Technologies Supporting the E-Business Initiative, Columbus, USA: McGraw Hill
- ^ Rosenberg, R.S. (2004), The Social Impact of Computers (3rd ed.), Place=Elsevier Academic Press, San Diego CA
- ^ CDT (2006), Following the Money (PDF), Center for Democracy & Technology
- ^ Vossen, Roland (attributed); October 21, 1995; Win 95 Source code in c!! posted to rec..programmer; retrieved from groups.google.com November 28, 2006. [dead link]
- ^ Wienbar, Sharon. "The Spyware Inferno Archived May 10, 2011, at the Wayback Machine". News.com. August 13, 2004.
- ^ Gibson, GRC OptOut -- Internet Spyware Detection and Removal, Gibson Research Corporation
- ^ Hawkins, Dana; "Privacy Worries Arise Over Spyware in Kids' Software". U.S. News & World Report. June 25, 2000 Archived November 3, 2013, at the Wayback Machine
- ^ "AOL/NCSA Online Safety Study Archived December 13, 2005, at the Wayback Machine". America Online & The National Cyber Security Alliance. 2005.
- ^ a b Spanbauer, Scott. "Is It Time to Ditch IE? Archived December 16, 2006, at the Wayback Machine". Pcworld.com. September 1, 2004
- ^ Keizer, Gregg. "Analyzing IE At 10: Integration With OS Smart Or Not?". TechWeb Technology News. August 25, 2005. Archived September 29, 2007, at the Wayback Machine
- ^ a b Vincentas (July 11, 2013). "Privacy Invasive Software in SpyWareLoop.com". Spyware Loop. Archived from the original on April 9, 2014. Retrieved July 27, 2013.
- ^ Görling, S. (2004), An Introduction to the Parasite Economy, Luxemburg: In Proceedings of EICAR
- ^ Pew, Internet (2005), "The Threat of Unwanted Software Programs is Changing the Way People use the Internet" (PDF), PIP Spyware Report July 05, Pew Internet & American Life Project, archived from the original (PDF) on July 13, 2007
- ^ Webroot (2006), "Differences between Spyware and Viruses", Spysweeper.com, Webroot Software, archived from the original on October 1, 2007
- ^ Good, N.; et al. (2006), "User Choices and Regret: Understanding Users' Decision Process About Consensually Acquired Spyware", I/S: A Journal of Law and Policy for the Information Society, vol. 2, no. 2
- ^ MTL (2006), AntiSpyware Comparison Reports, Malware-Test Lab, archived from the original on November 2, 2007, retrieved September 29, 2007
- ^ "SPYWARE" (PDF). Archived from the original (PDF) on November 1, 2013. Retrieved February 5, 2016.
- ^ a b Kim, Taejin; Yi, Jeong Hyun; Seo, Changho (January 2014). "Spyware Resistant Smartphone User Authentication Scheme". International Journal of Distributed Sensor Networks. 10 (3) 237125. doi:10.1155/2014/237125. ISSN 1550-1477. S2CID 12611804.
- ^ Bergren, Martha Dewey (October 1, 2004). "Spyware". The Journal of School Nursing. 20 (5): 293–294. doi:10.1177/10598405040200050801. ISSN 1059-8405. PMID 15469380.
- ^ Ames, Wes (2004). "Understanding spyware: risk and response". IT Professional. 6 (5): 25–29. Bibcode:2004ITPro...6e..25A. doi:10.1109/MITP.2004.71.
- ^ Basil Cupa, Trojan Horse Resurrected: On the Legality of the Use of Government Spyware (Govware) Archived February 1, 2014, at the Wayback Machine, LISS 2013, pp. 419–428
- ^ FAQ – Häufig gestellte Fragen Archived May 6, 2013, at the Wayback Machine
- ^ Jeremy Reimer (July 20, 2007). "The tricky issue of spyware with a badge: meet 'policeware'". Ars Technica. Archived from the original on November 6, 2012. Retrieved June 15, 2017.
- ^ Cooley, Brian (March 7, 2011). "'Like,' 'tweet' buttons divulge sites you visit: CNET News Video". CNet News. Archived from the original on March 10, 2016. Retrieved March 7, 2011.
- ^ Boldt, Martin; Carlsson, Bengt (2006). "Privacy-Invasive Software and Preventive Mechanisms". 2006 International Conference on Systems and Networks Communications (ICSNC'06). p. 21. doi:10.1109/ICSNC.2006.62. ISBN 0-7695-2699-3. S2CID 15389209.
- ^ Boldt, Martin (2007). "Privacy-Invasive Software Exploring Effects and Countermeasures" (PDF). Blekinge Institute of Technology Licentiate Dissertation Series. 01.
- ^ ASC (October 5, 2006). "Anti-Spyware Coalition".
- ^ StopBadware.org, StopBadware.org
- ^ StopBadware.org Guidelines, "StopBadware.org Software Guidelines", StopBadware.org, archived from the original on September 28, 2007
- ^ Saroiu, S.; Gribble, S.D.; Levy, H.M. (2004), "Measurement and Analysis of Spyware in a University Environment", Proceedings of the 1st Symposium on Networked Systems Design and Implementation (NSDI), San Francisco, USA
- ^ Edelman, Ben; December 7, 2004 (updated February 8, 2005); Direct Revenue Deletes Competitors from Users' Disks Archived July 6, 2010, at the Wayback Machine; benedelman.com. Retrieved November 28, 2006.
- ^ "Microsoft Acquires Anti-Spyware Leader GIANT Company". PressPass. December 16, 2004. Archived from the original on June 17, 2005. Retrieved December 21, 2020.
- ^ Garms, Jason (November 4, 2005). "What's in a name?? A lot!! Announcing Windows Defender!". blogs.technet.com. Archived from the original on November 23, 2005. Retrieved December 21, 2020.
- ^ Dodson, Steve (November 4, 2005). "Microsoft Windows AntiSpyware is now......"Windows Defender"". blogs.technet.com. Archived from the original on November 24, 2005. Retrieved December 21, 2020.
- ^ Qabalin, Majdi K.; Naser, Muawya; Alkasassbeh, Mouhammd (August 2, 2022). "Android Spyware Detection Using Machine Learning: A Novel Dataset". Sensors. 22 (15): 5765. doi:10.3390/s22155765. ISSN 1424-8220. PMC 9371186. PMID 35957337.
- ^ Stefan Frei, Thomas Duebendofer, Gunter Ollman, and Martin May, Understanding the Web browser threat: Examination of vulnerable online Web browser populations and the insecurity iceberg Archived September 11, 2016, at the Wayback Machine, Communication Systems Group, 2008
- ^ Virvilis, Nikos; Mylonas, Alexios; Tsalis, Nikolaos; Gritzalis, Dimitris (2015). "Security Busters: Web Browser security vs. rogue sites". Computers & Security. 52: 90–105. doi:10.1016/j.cose.2015.04.009.
- ^ Schuster, Steve. ""Blocking Marketscore: Why Cornell Did It". Archived from the original on February 14, 2007.". Cornell University, Office of Information Technologies. March 31, 2005.
- ^ Edelman, Ben (2004). "The Effect of 180solutions on Affiliate Commissions and Merchants Archived July 6, 2010, at the Wayback Machine". Benedelman.org. Retrieved November 14, 2006.
- ^ Ecker, Clint (2005). Massive spyware-based identity theft ring uncovered Archived September 16, 2008, at the Wayback Machine. Ars Technica, August 5, 2005.
- ^ Eckelberry, Alex. "Massive identity theft ring" Archived May 11, 2011, at the Wayback Machine, SunbeltBLOG, August 4, 2005.
- ^ Alex, Eckelberry (August 9, 2005). "Identity Theft? What to do?". The Legacy Sunbelt Software Blog. Archived from the original on March 19, 2018. Retrieved March 19, 2018.
- ^ FTC Releases Survey of Identity Theft in U.S. 27.3 Million Victims in Past 5 Years, Billions in Losses for Businesses and Consumers Archived May 18, 2008, at the Wayback Machine. Federal Trade Commission, September 3, 2003.
- ^ Russinovich, Mark. "Sony, Rootkits and Digital Rights Management Gone Too Far," Archived April 28, 2010, at the Wayback Machine, Mark's Blog, October 31, 2005. Retrieved November 22, 2006.
- ^ Press release from the Texas Attorney General's office, November 21, 2005; Attorney General Abbott Brings First Enforcement Action In Nation Against Sony BMG For Spyware Violations Archived July 25, 2010, at the Wayback Machine. Retrieved November 28, 2006.
- ^ "Sony sued over copy-protected CDs; Sony BMG is facing three lawsuits over its controversial anti-piracy software" , BBC News, November 10, 2005. Retrieved November 22, 2006.
- ^ Information About XCP Protected CDs. Retrieved November 29, 2006.
- ^ "Description of the Windows Genuine Advantage Notifications application". Microsoft Support. Archived from the original on June 18, 2010. Retrieved June 13, 2006.
- ^ Weinstein, Lauren. Windows XP update may be classified as 'spyware' Archived July 9, 2012, at archive.today, Lauren Weinstein's Blog, June 5, 2006. Retrieved June 13, 2006.
- ^ Evers, Joris. Microsoft's antipiracy tool phones home daily Archived August 28, 2012, at the Wayback Machine, CNET, June 7, 2006. Retrieved August 31, 2014.
- ^ "Creator and Four Users of Loverspy Spyware Program Indicted". Department of Justice. August 26, 2005. Archived from the original on November 19, 2013. Retrieved November 21, 2014.
- ^ "Tracking Cookie". Symantec. Archived from the original on January 6, 2010. Retrieved April 28, 2013.
- ^ Mehrotra, Dhruv. "The Ungodly Surveillance of Anti-Porn 'Shameware' Apps". Wired. ISSN 1059-1028. Retrieved September 22, 2022.
- ^ a b Timberg, Craig; Albergotti, Reed; Guéguen, Elodie (July 19, 2021). "Despite the hype, Apple security no match for NSO spyware - International investigation finds 23 Apple devices that were successfully hacked". The Washington Post. Archived from the original on July 19, 2021. Retrieved July 19, 2021.
- ^ "Activists and journalists in Mexico complain of government spying". Reuters. June 20, 2017. Archived from the original on May 13, 2023. Retrieved June 20, 2017.
- ^ a b Franceschi-Bicchierai, Lorenzo (August 25, 2016). "Government Hackers Caught Using Unprecedented iPhone Spy Tool". VICE Magazine. Archived from the original on February 24, 2023. Retrieved August 25, 2016.
- ^ Roberts, Paul F. (May 26, 2005). "Spyware-Removal Program Tagged as a Trap". eWeek. Retrieved September 4, 2008.[permanent dead link]
- ^ Howes, Eric L. "The Spyware Warrior List of Rogue/Suspect Anti-Spyware Products & Web Sites Archived September 22, 2018, at the Wayback Machine". Retrieved July 10, 2005.
- ^ Also known as WinAntiVirusPro, ErrorSafe, SystemDoctor, WinAntiSpyware, AVSystemCare, WinAntiSpy, Windows Police Pro, Performance Optimizer, StorageProtector, PrivacyProtector, WinReanimator, DriveCleaner, WinspywareProtect, PCTurboPro, FreePCSecure, ErrorProtector, SysProtect, WinSoftware, XPAntivirus, Personal Antivirus, Home Antivirus 20xx, VirusDoctor, and ECsecure
- ^ Elinor Mills (April 27, 2010). "Google: Fake antivirus is 15 percent of all malware". CNET. Archived from the original on May 10, 2011. Retrieved November 5, 2011.
- ^ McMillan, Robert. Antispyware Company Sued Under Spyware Law Archived July 6, 2008, at the Wayback Machine. PC World, January 26, 2006.
- ^ "Lawsuit filed against 180solutions Archived June 22, 2008, at the Wayback Machine". zdnet.com September 13, 2005
- ^ Hu, Jim. "180solutions sues allies over adware Archived August 10, 2011, at the Wayback Machine". news.com July 28, 2004
- ^ Coollawyer; 2001–2006; Privacy Policies, Terms and Conditions, Website Contracts, Website Agreements Archived May 13, 2013, at the Wayback Machine; coollawyer.com. Retrieved November 28, 2006.
- ^ "CHAPTER 715 Computer Spyware and Malware Protection Archived April 6, 2012, at the Wayback Machine". nxtsearch.legis.state.ia.us. Retrieved May 11, 2011.
- ^ Chapter 19.270 RCW: Computer spyware Archived July 21, 2011, at the Wayback Machine. apps.leg.wa.gov. Retrieved November 14, 2006.
- ^ Gross, Grant. US lawmakers introduce I-Spy bill Archived January 8, 2009, at the Wayback Machine. InfoWorld, March 16, 2007. Retrieved March 24, 2007.
- ^ "The Pall Mall Process declaration: tackling the proliferation and irresponsible use of commercial cyber intrusion capabilities". GOV.UK. Retrieved October 27, 2024.
- ^ See Federal Trade Commission v. Sperry & Hutchinson Trading Stamp Co.
- ^ FTC Permanently Halts Unlawful Spyware Operations Archived November 2, 2013, at the Wayback Machine (FTC press release with links to supporting documents); see also FTC cracks down on spyware and PC hijacking, but not true lies Archived December 26, 2010, at the Wayback Machine, Micro Law, IEEE MICRO (Jan.-Feb. 2005), also available at IEEE Xplore .
- ^ See Court Orders Halt to Sale of Spyware Archived December 4, 2010, at the Wayback Machine (FTC press release November 17, 2008, with links to supporting documents).
- ^ OPTA (November 5, 2007). "Besluit van het college van de Onafhankelijke Post en Telecommunicatie Autoriteit op grond van artikel 15.4 juncto artikel 15.10 van de Telecommunicatiewet tot oplegging van boetes ter zake van overtredingen van het gestelde bij of krachtens de Telecommunicatiewet" (PDF). Archived from the original (PDF) on January 29, 2011.
- ^ "State Sues Major "Spyware" Distributor" (Press release). Office of New York State Attorney General. April 28, 2005. Archived from the original on January 10, 2009. Retrieved September 4, 2008.
Attorney General Spitzer today sued one of the nation's leading internet marketing companies, alleging that the firm was the source of "spyware" and "adware" that has been secretly installed on millions of home computers.
- ^ Gormley, Michael. "Intermix Media Inc. says it is settling spyware lawsuit with N.Y. attorney general". Yahoo! News. June 15, 2005. Archived from the original on June 22, 2005.
- ^ Gormley, Michael (June 25, 2005). "Major advertisers caught in spyware net". USA Today. Archived from the original on September 20, 2008. Retrieved September 4, 2008.
- ^ Festa, Paul. "See you later, anti-Gators? Archived July 14, 2014, at the Wayback Machine". News.com. October 22, 2003.
- ^ "Gator Information Center Archived July 1, 2005, at the Wayback Machine". pcpitstop.com November 14, 2005.
- ^ a b "Initial LANrev System Findings" Archived June 15, 2010, at the Wayback Machine, LMSD Redacted Forensic Analysis, L-3 Services – prepared for Ballard Spahr (LMSD's counsel), May 2010. Retrieved August 15, 2010.
- ^ Doug Stanglin (February 18, 2010). "School district accused of spying on kids via laptop webcams". USA Today. Archived from the original on September 13, 2012. Retrieved February 19, 2010.
- ^ "Suit: Schools Spied on Students Via Webcam". CBS NEWS. March 8, 2010. Archived from the original on August 1, 2013. Retrieved July 29, 2013.
Bibliography
[edit]- Boldt, M. (2007a), Privacy-Invasive Software - Exploring Effects and Countermeasures (PDF), School of Engineering, Blekinge Institute of Technology, Sweden: Licentiate Thesis Series No. 2007:01, archived from the original (PDF) on July 16, 2011, retrieved September 28, 2007.
- Boldt, M. (2010), Privacy-Invasive Software (PDF), Blekinge, Sweden: School of Computing, Blekinge Institute of Technology, archived from the original (PDF) on April 8, 2014, retrieved March 15, 2013
- Boldt, M.; Carlsson, B.; Larsson, T.; Lindén, N. (2007b), Preventing Privacy-Invasive Software using Online Reputations (PDF), Springer Verlag, Berlin Germany: in Lecture Notes in Computer Science series, Volume 4721, archived from the original (PDF) on July 16, 2011, retrieved September 28, 2007.
- Boldt, M.; Carlsson, B. (2006a), Privacy-Invasive Software and Preventive Mechanisms (PDF), Papeete French, Polynesia: in Proceedings of IEEE International Conference on Systems and Networks Communications (ICSNC 2006), archived from the original (PDF) on July 16, 2011, retrieved September 28, 2007.
- Boldt, M.; Carlsson, B. (2006b), "Analysing Privacy-Invasive Software Countermeasures", Proceedings of IEEE International Conference on Systems and Networks Communications (ICSEA 2006), Papeete, French Polynesia.
- Boldt, M.; Jacobsson, A.; Carlsson, B. (2004), "Exploring Spyware Effects" (PDF), Proceedings of the Eighth Nordic Workshop on Secure IT Systems (NordSec2004), Helsinki, Finland, archived from the original (PDF) on February 3, 2007, retrieved September 28, 2007.
- Jacobsson, A. (2007), Security in Information Networks - from Privacy-Invasive Software to Plug and Play Business, School of Engineering, Blekinge Institute of Technology, Sweden: Doctoral Thesis.
- Jacobsson, A. (2004), Exploring Privacy Risks in Information Networks, School of Engineering, Blekinge Institute of Technology, Sweden: Licentiate Thesis Series No. 2004:11.
- Jacobsson, A.; Boldt, M.; Carlsson, B. (2004), Privacy-Invasive Software in File-Sharing Tools (PDF), Dordrecht NL: Kluwer Academic Publishers, archived from the original (PDF) on April 12, 2007, retrieved September 28, 2007.
External links
[edit]Spyware
View on GrokipediaDefinition and Classification
Core Definition and Characteristics
Spyware constitutes a category of malicious software engineered to infiltrate computing devices surreptitiously, enabling the unauthorized monitoring, collection, and exfiltration of user data to external entities without the device owner's explicit consent or awareness.[3][12] This infiltration typically occurs via deceptive means, such as bundled installations with legitimate software or exploitation of system vulnerabilities, distinguishing spyware from overt malware variants that prioritize disruption or destruction over clandestine observation.[13][6] Central characteristics of spyware encompass its emphasis on stealth and persistence: it operates in the background with minimal resource consumption to evade user detection and antivirus scans, often employing rootkit techniques to embed deeply within the operating system and resist removal even after system restarts or scans.[14][15] Data collection methods include keylogging to capture keystrokes, screen capturing for visual snapshots of activities, tracking of browser histories and application usage, and interception of communications such as emails or instant messages, all of which facilitate the aggregation of sensitive details like passwords, financial records, or personal identifiers.[16][3] Exfiltration occurs covertly, typically over encrypted channels or disguised network traffic, to third parties ranging from advertisers seeking behavioral profiles to cybercriminals exploiting data for identity theft or nation-state actors pursuing intelligence.[6][13] Spyware's impacts extend beyond privacy erosion to include performance degradation—such as slowed processing speeds or increased bandwidth usage from data uploads—and heightened vulnerability to secondary attacks, as collected intelligence can inform targeted phishing or ransomware deployments.[12] While some early variants blurred into adware by delivering unsolicited advertisements based on spied data, modern spyware prioritizes pure surveillance, often evading classification as mere "potentially unwanted programs" due to its intentional deceit and lack of any user benefit.[14][15] This focus on unauthorized access underscores spyware's role as a subset of malware specifically optimized for information dominance rather than systemic harm.[17]Distinctions from Related Software
Spyware is distinguished from other forms of malware primarily by its intent to covertly collect and exfiltrate user data, such as keystrokes, browsing history, or credentials, without the victim's knowledge or consent, rather than causing direct disruption or financial extortion.[3] Unlike viruses and worms, which are self-replicating and propagate by attaching to files or exploiting network vulnerabilities to infect multiple systems autonomously, spyware generally does not replicate itself and relies on initial user interaction or targeted deployment for installation.[18][19] In contrast to adware, which primarily generates revenue through unsolicited advertisements or browser redirects often bundled with legitimate software, spyware focuses on intelligence gathering for third-party use, such as identity theft or targeted advertising based on stolen personal information, though some adware variants incorporate spyware capabilities.[20] Trojans, while sharing spyware's non-self-replicating nature and deceptive installation methods—masquerading as benign applications—differ in that their core function is to provide unauthorized backdoor access or execute payloads beyond mere surveillance, such as downloading additional malware.[19] Rootkits, another related category, emphasize concealment by hiding processes, files, or network activity to maintain persistence and evade detection, often serving as enablers for spyware but not defined by data exfiltration themselves.[21] Ransomware sets itself apart through encryption of victim files followed by ransom demands for decryption keys, prioritizing monetary gain over information theft, whereas spyware's economic or strategic value derives from the harvested data's exploitation, such as in corporate espionage or surveillance operations.[22] These distinctions highlight spyware's specialized role within the broader malware ecosystem, where functionality overlaps exist but primary objectives—surveillance versus propagation, monetization via ads or extortion—remain divergent.[23][24]Historical Evolution
Early Origins and Adware Emergence (1990s–2000s)
The concept of adware originated in 1992 as free software distributed by authors that included advertisements for their other products, without external data collection or user tracking.[25] By 1998, adware evolved to encompass programs that downloaded advertisements from third-party ad agencies via internet connections, marking a shift toward more intrusive models reliant on network activity.[25] This change facilitated the bundling of adware with free software downloads, a common distribution method in the late 1990s that often evaded user awareness through opaque installation prompts.[15] The term "spyware" first appeared publicly in October 1995 on Usenet, an early internet discussion system, referring to software that covertly gathered user information.[26] Early instances included simple keyloggers emerging in the mid-1990s, which recorded keystrokes to capture sensitive data like passwords without authorization.[27] These tools represented initial forays into unauthorized monitoring, predating more sophisticated adware variants. Adware programs like Aureate (later Radiate), bundled with free applications in the late 1990s, secretly collected user browsing data to enable targeted advertising, blurring lines with spyware definitions as they operated without explicit consent.[15] In 1999, Gator software launched as a password manager but quickly incorporated tracking features that intercepted web requests to insert context-based ads, leading to widespread classification as spyware despite developer objections.[28] This period saw adware's proliferation through software bundling, where users downloading utilities like file-sharing tools unwittingly installed components that profiled online behavior for commercial gain.[29] By the early 2000s, cybersecurity analyses formalized spyware as distinct yet overlapping with adware, emphasizing non-consensual data exfiltration over mere ad display.[3] Such practices laid groundwork for escalating privacy invasions, with programs scanning browser cookies and deploying invisible web bugs to track users across sessions.[30]Commercial and Criminal Proliferation (2010s)
During the 2010s, commercial spyware vendors proliferated, primarily targeting governments and law enforcement with tools marketed for lawful interception and surveillance. Israeli firm NSO Group, founded in 2010 by former intelligence operatives, developed Pegasus, a sophisticated mobile spyware enabling remote infection via zero-day exploits and zero-click methods to access encrypted communications, location data, and device microphones without user interaction.[31] Italian company Hacking Team sold its Remote Control System (RCS) to over 40 governments, including authoritarian regimes, for persistent device compromise and data exfiltration; a July 2015 data breach exposed client lists, internal emails, and source code, revealing sales to entities in Ethiopia, Saudi Arabia, and Russia.[32] German-based Gamma Group offered FinFisher (later FinSpy), deployed against dissidents and activists in at least 20 countries by 2014, with capabilities for keylogging, screenshot capture, and Skype monitoring.[33] These vendors operated in a opaque market, often evading export controls, with tools repurposed beyond stated lawful uses, as evidenced by infections of journalists and human rights defenders.[34] Criminal exploitation of spyware surged alongside commercial growth, fueled by malware-as-a-service (MaaS) models on dark web forums and leaks from legitimate vendors. Remote Access Trojans (RATs), a common spyware variant, enabled cybercriminals to remotely control victims' devices for credential theft, webcam spying, and financial fraud; by 2015, prevalent RATs included DarkComet, njRAT, and Poison Ivy, often bundled with ransomware precursors.[35] Blackshades RAT, sold via underground sites since 2010, infected over 500,000 computers worldwide by 2014, allowing attackers to capture keystrokes, activate cameras, and steal banking data before an international takedown by the FBI and Europol.[36] The Hacking Team breach amplified criminal access, as leaked RCS code was reverse-engineered and redistributed on hacker forums, enabling non-state actors to deploy government-grade persistence modules against private targets.[37] NanoCore RAT, marketed as a "hacking tool" on exploit kits from 2013 onward, facilitated mass surveillance and blackmail, leading to its creator's 2018 sentencing for distributing malware that compromised thousands of systems.[38] This era saw RATs evolve from basic adware descendants to modular kits rented for $50–$500 monthly, democratizing espionage for profit-driven gangs targeting enterprises and individuals.[39] The interplay between commercial and criminal spheres intensified risks, as vendor tools leaked or sold illicitly bridged state-level sophistication with widespread cybercrime; for instance, FinFisher samples appeared in dark web markets post-2011 exposures, underscoring lax safeguards in the spyware ecosystem.[40] Cybersecurity firms reported exponential growth in spyware detections, with Symantec noting a shift toward mobile-targeted variants by mid-decade, though precise market valuations remained elusive due to the industry's secrecy.[41]State-Sponsored Advancements and Global Spread (2020s)
In the 2020s, state-sponsored spyware advanced through commercial providers developing zero-click infection capabilities, enabling remote device compromise without user interaction. Israel's NSO Group enhanced its Pegasus software to exploit vulnerabilities in iOS and Android systems, including iMessage zero-days, allowing full access to encrypted communications, cameras, and microphones.[42] These tools, marketed exclusively to governments for counter-terrorism, incorporated advanced evasion techniques to persist undetected and exfiltrate data stealthily.[43] The 2021 Pegasus Project, a collaborative investigation by Amnesty International and media outlets, exposed the spyware's deployment against over 50,000 phone numbers across more than 50 countries, targeting journalists, human rights defenders, and political figures rather than solely terrorists.[44] Governments in Saudi Arabia, the United Arab Emirates, Mexico, and Hungary were implicated in infections of dissidents and critics, with forensic evidence confirming Pegasus remnants on devices of individuals like Jamal Khashoggi's associates.[44] Similar Israeli firms, such as Candiru, offered comparable kernel-level exploits sold to at least 10 nations by 2021.[45] Regulatory pushback emerged amid revelations of misuse, with the U.S. Department of Commerce adding NSO Group to its Entity List in November 2021, citing actions contrary to U.S. national security and foreign policy interests due to spyware enabling human rights abuses. Despite this, proliferation continued; the FBI acquired Pegasus in early 2022 for vulnerability research, though it did not deploy it operationally.[46] In October 2025, a U.S. court issued an injunction barring NSO from targeting WhatsApp users, following Meta's 2019 lawsuit over 1,400 infections via the app, though it reduced a $168 million damages award.[47] Europe saw expanded use of alternatives like Predator spyware from Intellexa, with Greece's 2022 scandal revealing attempts to infect at least 87 targets, including opposition leader Nikos Androulakis and journalists, via the National Intelligence Service alongside commercial tools.[48] The 2023 Predator Files documented attacks on civil society in the EU, U.S., and Asia, implicating buyers in Egypt, Saudi Arabia, and Vietnam.[49] By mid-decade, at least 11 countries, including Council of Europe members like Azerbaijan and Hungary, were identified as NSO clients, highlighting spyware's diffusion from autocracies to democracies despite export controls.[50] This spread underscored a market boom in mercenary surveillance, with firms adapting to sanctions by rebranding or shifting operations.[45]Technical Mechanisms
Infection Vectors and Deployment
Spyware typically infects devices through social engineering tactics, such as phishing emails containing malicious attachments or links that prompt users to download infected files.[51] These methods exploit human error, with attackers disguising spyware as legitimate software updates or documents to trick users into execution.[27] Malicious browser extensions and bundled installations with freeware also serve as common vectors, where spyware is covertly included in legitimate downloads from unverified sources.[2] Drive-by downloads occur when users visit compromised websites, triggering automatic exploitation of browser or plugin vulnerabilities without any user interaction.[27] Exploit kits, automated tools sold on underground markets, scan for and leverage unpatched software flaws to deploy spyware payloads.[27] On mobile devices, spyware spreads via smishing (SMS phishing) or sideloading apps from third-party stores, bypassing official app vetting processes.[52] Advanced persistent spyware, such as NSO Group's Pegasus, employs zero-click exploits that require no user action, often targeting messaging apps like iMessage or WhatsApp to install via crafted network packets.[53] These exploits chain multiple zero-day vulnerabilities in iOS or Android systems, enabling remote code execution and payload delivery.[42] One-click variants lure targets to malicious links, but state actors prioritize zero-click for stealthy, targeted deployment against high-value individuals.[52] Criminal operators deploy spyware en masse using botnets and email spam campaigns to maximize infection rates for data theft or ad fraud.[27] In contrast, government-affiliated deployments focus on precision, leveraging custom exploits and intelligence for surveillance of activists, journalists, or rivals, as documented in operations across 45 countries.[54] Physical access enables direct installation, though rarer due to logistical challenges.[2]Behavioral Features and Data Exfiltration
Spyware exhibits stealthy behavioral patterns designed to evade detection while continuously monitoring user activities. It typically operates as hidden processes or modules integrated into the operating system or applications, attaching to system components to run in the background without visible indicators.[55] Common behaviors include hooking into application programming interfaces (APIs) to intercept events, such as browser navigation or keyboard inputs, enabling real-time data capture without altering system performance noticeably.[56] For instance, components like Browser Helper Objects (BHOs) subscribe to browser events via COM interfaces, tracking URL changes, page loads, and form submissions.[56] Monitoring capabilities encompass a range of invasive actions, including keylogging to record keystrokes, screenshot capture, and access to peripherals like microphones and cameras for audio or video recording.[57] Advanced variants query application databases—such as those for email, messaging apps (e.g., WhatsApp, Gmail), and calendars—to extract contacts, messages, and location data, often granting temporary elevated permissions before reverting them to maintain stealth.[57] These behaviors are triggered by user actions or scheduled intervals, with spyware minimizing resource usage to avoid triggering anomaly detection in endpoint security tools.[58] Data exfiltration involves transmitting collected information to remote command-and-control (C2) servers, often in encrypted payloads to obscure content. Techniques include HTTP/HTTPS requests with AES encryption, multipart/form-data formatting, or XML structures for structured data like key-value pairs; alternative channels such as SMS for small payloads or MQTT for command-response interactions enable fallback when primary networks are unavailable.[57] Exfiltration occurs via configurable beaconing—periodic uploads at intervals like every few minutes—or immediate transmission upon command receipt, using API calls like InternetConnect to establish covert connections.[56] To reduce detectability, data is often fragmented into small packets or disguised within legitimate traffic, forwarding sensitive details such as credentials, browsing history, and personal files to third-party operators without user consent.[3]Evasion and Persistence Techniques
Spyware employs evasion techniques to circumvent detection by antivirus software, endpoint detection tools, and user scrutiny, often leveraging obfuscation, environmental checks, and behavioral mimicry. Code obfuscation, such as packing, encryption, or control-flow alteration, renders static analysis ineffective by concealing malicious payloads within legitimate-looking binaries.[59] Environmental awareness tactics detect analysis environments like sandboxes through checks for virtual machine artifacts, low resource usage, or absent user interactions, delaying or aborting execution in controlled settings.[60] Advanced variants, including state-sponsored spyware like Pegasus, integrate zero-click exploits and infrastructure obfuscation to bypass network monitoring and exploit unpatched vulnerabilities without user interaction.[61] Persistence mechanisms ensure spyware survives system reboots, process terminations, and remediation attempts, embedding itself via system-level hooks or scheduled executions. Common methods include modifying Windows registry run keys (e.g., HKLM\Software[Microsoft](/page/Microsoft)\Windows\CurrentVersion\Run) to relaunch on startup, creating scheduled tasks via schtasks.exe, or installing as system services for elevated privileges.[62] On mobile platforms, spyware achieves persistence by exploiting boot processes or leveraging automation frameworks, such as iOS Shortcuts for periodic configuration fetches in Pegasus infections.[63] Kernel-level rootkits intercept system calls to hide files, processes, and network activity, enabling long-term data exfiltration while evading kernel integrity checks.[64]- Registry and Startup Modifications: Alters autorun entries for automatic reinfection post-reboot.[65]
- Scheduled Tasks and Cron Jobs: Deploys timed executions independent of user logins, common in cross-platform spyware.[62]
- Service Installation: Registers as legitimate services to run with system privileges, resisting casual removal.[66]
- Bootkit Integration: Hooks into firmware or bootloaders for pre-OS persistence, as seen in advanced mobile spyware.[67]
Legitimate Uses
Corporate Monitoring for Productivity and Security
Corporate monitoring software deploys surveillance capabilities on employee devices to oversee computer usage, including keystroke logging, screen captures, application tracking, and network activity, primarily to enhance productivity and mitigate security risks. Tools such as Teramind enable real-time monitoring of emails, websites, and file transfers, allowing detection of anomalous behavior indicative of data leaks or policy violations.[70] Similarly, ActivTrak aggregates data on app and website interactions to categorize time spent on productive versus unproductive tasks, with 80% of companies using such systems to track office attendance and 37% extending oversight to remote workers.[71] These applications operate with employer consent on company-owned hardware, distinguishing them from unauthorized spyware by aligning with business objectives like compliance enforcement.[72] In the United States, such monitoring is permissible under the Electronic Communications Privacy Act (ECPA) of 1986 for legitimate business purposes, provided it avoids intercepting personal communications without notice, though state laws may impose additional disclosure requirements.[73] For productivity, vendors report that 81% of implementing firms observed gains, attributed to reduced idle time and better resource allocation, amid a market projected to reach $7.61 billion by 2029 at an 18.1% CAGR.[74] Security applications focus on insider threat detection; for instance, Teramind's AI-driven anomaly detection flags potential data exfiltration, supporting forensic investigations into breaches.[75] Peer-reviewed analyses indicate electronic monitoring correlates with modest productivity uplifts in controlled settings, though effects vary by implementation, with some studies noting r = 0.10 associations between surveillance intensity and output metrics in task-oriented roles.[76] Despite these benefits, empirical evidence highlights trade-offs, including elevated employee stress (r = 0.11 correlation with monitoring) and reduced job satisfaction, potentially offsetting gains if perceived as overly intrusive.[76] Effective deployment requires transparent policies, as undisclosed monitoring risks legal challenges under privacy statutes, while balanced use—focusing on aggregate trends rather than individual micromanagement—preserves morale and sustains long-term efficacy.[77] The global employee surveillance market, valued at $648.8 million in 2025, underscores growing adoption driven by remote work demands, with projections to $1.465 billion by 2032.[78]Parental and Family Protection Tools
Parental control tools encompass software applications designed to monitor and restrict children's access to digital content and devices, often employing techniques akin to spyware such as real-time tracking of browsing history, app usage, and communications to mitigate online risks including exposure to explicit material, cyberbullying, and predatory interactions. These tools are installed on family devices with parental consent, enabling oversight of minors' activities to promote safer digital habits, with features like content filtering and usage limits grounded in the legal authority of guardians over dependents. Adoption has grown with smartphone proliferation, as evidenced by over 7 million parents using platforms like Qustodio for cross-device monitoring as of 2024.[79] Core functionalities include geofencing for location alerts, screenshot capture or keystroke logging in advanced variants, and AI-driven scanning of texts, emails, and social media for flagged keywords related to self-harm, drugs, or violence, with apps like Bark analyzing over 29 categories of potential threats in messages and images.[80] Other capabilities encompass screen time scheduling, remote device locking, and web blocking based on predefined categories, as implemented in Norton Family, which provides real-time alerts for suspicious searches or downloads.[81] These mechanisms rely on persistent background processes to exfiltrate usage data to parental dashboards, distinguishing them from purely preventive filters by emphasizing surveillance for proactive intervention.[82] Prominent examples include Qustodio, which supports multi-platform tracking including YouTube monitoring, and Net Nanny, focused on real-time content analysis; both have been rated highly in independent tests for 2025 efficacy in blocking inappropriate sites.[83] Microsoft's Family Safety integrates location sharing and driving reports for teens, while Bark emphasizes alert-based monitoring over strict blocking to foster discussions.[81] Empirical studies indicate modest effectiveness, with a meta-analysis of 29 interventions showing small but significant reductions in children's screen time through such tools, particularly when paired with parental mediation strategies.[84] However, restrictive monitoring correlates with increased adolescent problematic media use in some longitudinal data, suggesting over-reliance may hinder self-regulation development, and tech-savvy users often circumvent controls via VPNs or app hiding.[85] A 2023 review of parental controls highlights their role in fulfilling family safety expectations but notes variable outcomes dependent on consistent enforcement and open communication, underscoring that these tools supplement rather than replace active parenting.[86]Government and Intelligence Applications
Governments and intelligence agencies deploy spyware for targeted surveillance to counter terrorism, organized crime, and other threats to national security, often under legal warrants or national security authorizations that permit remote device compromise for evidence collection and threat mitigation. These applications typically involve installing persistent software to access encrypted communications, geolocation data, microphone feeds, and files, enabling operations that would otherwise require physical access or cooperation from service providers. Vendors like NSO Group emphasize that such tools are licensed only to vetted state actors for lawful investigations, with built-in controls to limit deployment to high-value targets such as suspected terrorists or pedophile networks.[87] Pegasus, NSO Group's flagship spyware introduced in 2011, exemplifies this use, allowing zero-click infections on iOS and Android devices to extract real-time data while evading detection. Marketed exclusively to governments, it has facilitated disruptions of terrorist financing and plotting; for example, European investigators applied Pegasus to dismantle transnational organized crime syndicates and a global child pornography ring, yielding actionable intelligence that led to arrests and prevented attacks.[88] NSO reports that Pegasus deployments have thwarted multiple terrorist incidents across client nations, though independent verification remains limited due to classified operations.[87] FinFisher (also known as FinSpy), developed by Germany's Gamma Group since around 2010, serves similar intelligence functions, sold solely to law enforcement and intelligence entities for monitoring suspects in counter-espionage and anti-terrorism efforts. The suite supports modular payloads for call interception, keylogging, and screen capture, deployed via spear-phishing or network exploits against targets in over 20 countries, including operations against militant groups.[89] Domestic tools augment these commercial options; the U.S. FBI, for instance, employs the Network Investigative Technique (NIT), a warrant-authorized malware variant used to unmask anonymous users on encrypted networks. In the 2015 Operation Pacifier targeting the Playpen dark web forum, NIT infected over 8,000 visitors' devices, harvesting IP addresses and MAC identifiers that enabled identification of more than 1,000 suspects, culminating in 870 arrests, 500+ child victims rescued, and seizure of vast illicit material across 120 countries.[90] Such techniques operate under Federal Rules of Criminal Procedure amendments allowing cross-jurisdictional hacking warrants for serious felonies.[91] Regulatory responses underscore the balance between utility and risk; in March 2023, a U.S. executive order barred federal agencies from using commercial spyware deemed to pose counterintelligence threats, such as unvetted foreign tools, while preserving in-house capabilities and requiring risk assessments for any acquisitions.[92] This reflects empirical concerns over supply chain vulnerabilities, as evidenced by prior FBI evaluations of Pegasus in 2019, which highlighted potential backdoors exploitable by adversaries despite its efficacy against domestic threats.[93]Malicious Applications
Economic Exploitation and Fraud
Spyware enables economic exploitation by covertly capturing sensitive financial data, such as banking credentials, credit card details, and personal identifiers, which cybercriminals use to perpetrate fraud including unauthorized transactions and identity theft.[14] These tools often function as keyloggers or screen capturers, monitoring user inputs during online banking sessions to exfiltrate information without detection.[18] For instance, banking trojans like SpyEye, active since 2009, employ form-grabbing techniques to intercept login data from web forms, facilitating direct theft from victim accounts.[94] In corporate contexts, spyware targets industrial control systems (ICS) to harvest credentials for broader network access, enabling theft of proprietary data or intellectual property for economic advantage. Kaspersky ICS CERT documented a rise in such anomalous spyware attacks on ICS computers globally in 2021, often abusing trusted infrastructure to pursue corporate secrets.[95] State-linked actors, such as those affiliated with China, have surged cyber espionage efforts by 150% as reported in CrowdStrike's 2025 Global Threat Report, frequently deploying spyware to acquire trade secrets for competitive economic gains rather than purely political motives.[96][97] Mobile variants, particularly Android banking trojans, exemplify fraud deployment by overlaying fake interfaces to capture credentials or bypassing two-factor authentication, leading to drained accounts and substantial individual losses.[98] These threats contribute to the broader ecosystem of financial cybercrime, where stolen data fuels scams; however, isolating spyware-specific losses remains challenging amid aggregated reports showing U.S. cyber fraud exceeding $12.5 billion in 2023 per FBI data, with malware including spyware as a key vector.[99] While peer-reviewed analyses confirm trojans' role in credential theft, attribution to non-state fraudsters versus state economic espionage varies, underscoring the dual-use nature of such tools.[100]Personal and Interpersonal Abuse
Spyware, commonly referred to as stalkerware in personal contexts, consists of commercially available applications designed for covert monitoring of smartphones, enabling unauthorized access to location data, communications, photos, and device cameras or microphones without the target's knowledge or persistent notification.[101] These tools are typically installed by abusers who gain physical access to an unlocked device, often downloading from app stores or sideloading via enabled "unknown sources" settings, with some apps allowing remote setup if credentials are compromised.[102] Features such as icon hiding and data exfiltration to remote servers facilitate prolonged surveillance, distinguishing stalkerware from overt monitoring software.[103] In 2023, Kaspersky Laboratory identified stalkerware on 31,031 unique mobile devices globally, marking a rise from 29,312 cases in 2022, with detections across 175 countries and highest concentrations in Russia (9,890 users), Brazil (4,186), and India (2,492).[103] Android devices accounted for the vast majority of infections due to their open ecosystem, while iOS infections remain rarer, necessitating jailbreaking and direct access.[101] This prevalence underscores stalkerware's role in interpersonal abuse, particularly intimate partner violence (IPV), where it supports tactics of control and isolation by tracking victims' movements and interactions in real time.[102] Research on IPV survivors reveals that spyware deployment affects roughly 20% of cases studied, with abusers leveraging apps like mSpy and FlexiSPY—originally marketed for legitimate monitoring—to intercept SMS, calls, and social media activity.[102] Victims often discover infections indirectly through symptoms like excessive battery drain or data usage, though specialized detection tools identify fewer than 3% of dual-use applications, frequently requiring a factory reset for removal.[102] In non-romantic interpersonal scenarios, such as post-separation harassment, stalkerware enables extended stalking, with some vendors explicitly advertising capabilities for "catching cheaters" that align with abusive intent.[104] The commercial ecosystem for these tools, including over 195 variants detected in 2023, often frames them as parental or employee safeguards, yet their misuse in personal abuse persists due to lax regulation and ease of acquisition, amplifying risks of psychological harm and physical escalation in volatile relationships.[103][105]Geopolitical Espionage and Repression
State actors have deployed commercial spyware, such as NSO Group's Pegasus, for geopolitical espionage by targeting foreign officials, journalists, and rivals to gather intelligence and influence operations.[106] In July 2021, the Pegasus Project investigation revealed that Pegasus infected devices of individuals in 34 countries, including politicians and government officials, enabling unauthorized access to communications and location data.[44] Forensic analysis by Citizen Lab documented Pegasus infections among Bahraini activists between June 2020 and February 2021, attributing operations to government clients despite NSO's claims of use solely for counter-terrorism.[107] In repressive contexts, spyware facilitates surveillance and silencing of domestic dissidents, human rights defenders, and independent media. Mexican authorities, the largest known user of Pegasus, deployed it against journalists and activists, with over 15,000 targets identified by 2017, extending beyond initial anti-cartel operations to stifle opposition.[108] In El Salvador, between July 2020 and November 2021, Pegasus successfully compromised phones of journalists and civil society members, coinciding with government crackdowns on media criticism.[109] Similarly, in Jordan, over 30 journalists, lawyers, and activists had their devices hacked with Pegasus as of February 2024, amid efforts to control dissent.[110] Geopolitical repression extends to transnational targeting, where exiled opposition figures face spyware attacks. Citizen Lab identified Pegasus infections targeting Russian- and Belarusian-speaking independent journalists and opposition media in Europe as of May 2024, linked to state efforts to suppress narratives abroad.[111] A 2023 U.S. intelligence assessment highlighted the global rise of digital repression tools, including spyware, used by authoritarian regimes to control public debate and track dissidents via zero-click exploits that evade user detection.[112] These applications underscore spyware's role in enabling unaccountable surveillance, often evading legal oversight through commercial vendors' opaque licensing to governments.[113]Prominent Examples and Actors
Key Spyware Programs and Variants
Pegasus, developed by Israel's NSO Group since 2011, enables remote infection of iOS and Android devices via zero-click exploits, granting access to messages, emails, location data, microphone, and camera without user interaction.[42][114] It has been deployed against journalists, activists, and politicians in over 50 countries, as revealed in the 2021 Pegasus Project investigation involving leaked lists of 50,000 potential targets.[115] NSO claims Pegasus targets only terrorists and criminals, but documented abuses include surveillance of figures like Jamal Khashoggi's associates and Mexican journalists.[116][117] FinFisher (also known as FinSpy), produced by Germany's FinFisher GmbH since at least 2011, supports infections across Windows, macOS, Linux, Android, and iOS, featuring keylogging, screen capture, and data exfiltration to command servers.[118][119] Variants include UEFI bootkit persistence and multi-layer obfuscation to evade detection, with deployments in nearly 20 countries for monitoring dissidents and opposition figures.[120][121] It has been linked to use by authoritarian regimes, such as in Egypt targeting human rights defenders.[122] Remote Control System (RCS), sold by Italy's Hacking Team from 2003 until the company's 2015 data breach, allowed governments to intercept communications, activate cameras, and harvest files on infected devices via exploits in Adobe Flash and other software.[123] RCS variants persisted post-breach, with samples detected in the wild as late as 2018, sold to entities including the US DEA and Saudi Arabia despite human rights concerns.[124][125] Predator, originating from North Macedonia's Cytrox in 2018 and marketed by the Intellexa consortium, mirrors Pegasus with browser-based and zero-click iOS/Android infections, enabling full device compromise for surveillance.[126] It targeted Egyptian opposition in 2021 and faced US sanctions in 2024 for proliferation to repressive governments.[127] Variants under Intellexa include enhanced stealth features, with ongoing activity despite sanctions.[128] Candiru's spyware, developed by the Israeli firm since 2014, exploits Windows, iOS, and Android vulnerabilities for undetectable persistence, data theft, and live interception, sold exclusively to governments.[129] Infrastructure scans identified over 750 global command-and-control domains, with infections linked to targeting in the Middle East, Europe, and against Catalan activists using variants like DevilsTongue.[130][131] US blacklisting in 2021 cited risks to national security from its capabilities.[32]Major Vendors and State Users
NSO Group, an Israeli company established in 2010, is among the most prominent vendors of commercial spyware, offering Pegasus—a tool enabling remote, zero-click installation on iOS and Android devices to access encrypted messages, calls, location data, and activate microphones and cameras.[42] NSO markets Pegasus exclusively to governments for lawful interception against criminals and terrorists, but forensic analyses have confirmed its deployment against journalists, human rights defenders, and political opponents in at least 45 countries.[117] Documented state users include Saudi Arabia, the United Arab Emirates, Bahrain, Mexico, Hungary, India, Morocco, and Rwanda, with over 50,000 phone numbers selected for potential surveillance by NSO clients since 2016, as revealed in the 2021 Pegasus Project investigation.[132] In 2019, Pegasus infected 1,223 WhatsApp users across 51 countries via missed calls, prompting a U.S. lawsuit against NSO that advanced following a 2025 appellate court rejection of the firm's appeal.[133] Candiru, a Tel Aviv-based firm founded around 2014, provides bespoke spyware solutions sold solely to governments, with capabilities to exploit vulnerabilities in Windows, iOS, Android, and other platforms for data exfiltration.[129] Internet scans have linked Candiru infrastructure to over 750 domains across multiple countries, with infections detected on devices of civil society targets in at least 10 nations, including Saudi Arabia, the UAE, and Egypt, often mirroring patterns seen in NSO deployments.[129] The U.S. Commerce Department blacklisted Candiru in 2021 for enabling human rights abuses through its technology.[134] FinFisher (also known as FinSpy), developed by Munich-based Gamma Group since the early 2010s, is a modular surveillance suite capable of keystroke logging, file theft, and remote device control, marketed to law enforcement and intelligence agencies.[89] Governments deploying FinFisher include Egypt, Bahrain, Ethiopia, Saudi Arabia, Turkey, and Qatar, with evidence of its use for monitoring dissidents and activists dating to 2011 and persisting into the 2020s, including Mac and Linux variants discovered in Egypt in 2020.[122] Leaked documents from 2014 exposed Gamma's sales efforts to repressive regimes, confirming deployments in over 20 countries for targeted interception.[135] Other notable vendors include Israel's QuaDream, whose exploits have infected civil society targets in North America, Central Asia, and Southeast Asia since at least 2019,[136] and Paragon Solutions, which targeted scores of WhatsApp users in 2025, prompting disclosures from Meta.[137] Greece-linked Intellexa and Cytrox, part of a broader consortium, supplied Predator spyware to European governments, including in a 2022 scandal involving opposition politicians.[138] These firms predominantly serve authoritarian-leaning states for geopolitical repression, though some democratic governments have procured similar tools for counter-espionage, with U.S. intelligence occasionally accessing NSO-derived data despite official blacklists.[139]| Vendor | Origin | Primary Clients (Examples) |
|---|---|---|
| NSO Group | Israel | Saudi Arabia, UAE, Mexico, Hungary |
| Candiru | Israel | Saudi Arabia, UAE, Egypt |
| Gamma Group | Germany | Egypt, Bahrain, Ethiopia, Turkey |
| QuaDream | Israel | Undisclosed; targets in Asia, North America |
| Intellexa | Greece | Greece, other EU states |
Detection, Removal, and Prevention
Anti-Spyware Technologies and Methods
Anti-spyware technologies encompass specialized software and techniques designed to identify, block, and eradicate spyware, which covertly monitors user activities without consent. These tools typically integrate scanning mechanisms that examine system files, registry entries, and network traffic for indicators of compromise. According to a 2006 study on behavior-based detection, effective anti-spyware relies on abstract characterizations of spyware behaviors, such as unauthorized data exfiltration via browser helper objects.[9] Modern implementations, as of 2025, often combine multiple detection layers to address evolving threats, with empirical data indicating that anti-spyware resolves over 80% of identifiable spyware issues when properly deployed.[140] Detection methods primarily fall into signature-based, heuristic, and behavioral categories. Signature-based detection matches files against databases of known spyware hashes or code patterns, offering high accuracy for previously cataloged threats but vulnerability to obfuscated variants or zero-day exploits.[141] Heuristic analysis, in contrast, employs rule-based algorithms to flag suspicious code structures or anomalies without exact matches, enabling proactive identification of novel spyware; however, it risks false positives by overgeneralizing patterns.[142] Behavioral analysis monitors runtime activities, such as unusual API calls or persistent network connections, providing zero-day protection by inferring malice from actions rather than static traits—Symantec's SONAR, for instance, detects threats pre-execution through such emulation.[143] A 2025 review of spyware detection techniques highlights behavior-based methods as increasingly vital due to their adaptability, though they demand computational resources for real-time monitoring.[144] Removal processes involve quarantine, deletion, or disinfection of infected components, often initiated via full system scans by dedicated tools like Malwarebytes or SuperAntiSpyware, which target adware and tracking cookies alongside core spyware.[145] The U.S. Cybersecurity and Infrastructure Security Agency (CISA) recommends running legitimate anti-spyware products post-infection, followed by registry cleanup and process termination to prevent reinfection.[146] Empirical studies underscore the efficacy of holistic removal frameworks, which address not only technical artifacts but also user behaviors contributing to persistence, such as unpatched vulnerabilities.[147] Preventive methods integrate real-time protection, firewalls, and system hardening. Real-time scanners block spyware during downloads or execution, while firewalls restrict outbound connections typical of data theft.[3] Government guidelines emphasize regular software updates, avoidance of unsolicited links, and browser configurations to disable automatic downloads, reducing infection vectors by up to 90% in controlled environments.[146] [148] Advanced endpoint detection and response (EDR) tools extend these by correlating behaviors across endpoints, though adoption remains limited—only about 10% of users historically install dedicated anti-spyware despite its proven utility.[140]User-Level Security Practices
Users can mitigate spyware risks through proactive measures that address common infection vectors, such as phishing, malicious downloads, and unpatched vulnerabilities. Empirical evidence from cybersecurity analyses indicates that over 90% of malware infections, including spyware, originate from user actions like clicking unsolicited links or installing unverified software, underscoring the efficacy of behavioral safeguards.[149] [3] Keeping operating systems and applications updated automatically patches known exploits exploited by spyware, as demonstrated by incidents where unpatched systems accounted for 60% of successful intrusions in 2023 reports.[150] [151] Installing and maintaining reputable antivirus or anti-malware software with real-time scanning capabilities is essential, as these tools detect and block spyware signatures before execution; for instance, tools compliant with standards like those from the Anti-Malware Testing Standards Organization (AMTSO) have removal rates exceeding 95% for known threats in independent tests conducted through 2024.[150] [14] Users should enable user account control (UAC) features to prompt for administrative privileges during installations, preventing unauthorized spyware deployment without explicit consent, a practice recommended by federal guidelines to limit privilege escalation.[150] [148]- Avoid suspicious downloads and links: Refrain from opening email attachments or clicking hyperlinks from unknown sources, as phishing remains the primary spyware delivery method, responsible for 82% of breaches in analyzed data from 2022-2024.[152] [146]
- Manage permissions and cookies: Review and restrict application permissions to essential functions, and decline non-essential cookies on websites to curb tracking spyware; browser extensions designed for anti-tracking, such as those blocking third-party trackers, reduce exposure by up to 70% according to privacy audits.[14] [5]
- Use secure networks and firewalls: Connect only to trusted Wi-Fi networks and enable host-based firewalls to monitor outbound connections, blocking spyware "phone-home" attempts to command-and-control servers, a tactic observed in 85% of detected spyware variants.[3] [153]
- Conduct regular scans and audits: Perform full system scans weekly with updated anti-spyware tools and audit installed applications for anomalies, enabling early detection; removal efficacy improves when combined with safe mode booting to isolate persistent threats.[146] [152]

